List plugins
GET {{baseUrl}}/plugins/plugin?last_updated=deserunt&size=67454373&page=67454373
Returns a paginated list of Tenable plugins with detailed plugin information. You can filter the list on the value of the last_updated
date field. The list is sorted by plugin ID.
Requires BASIC [16] user permissions. See Permissions.
Request Params
Key | Datatype | Required | Description |
---|---|---|---|
last_updated | string | The last updated date to filter on in the YYYY-MM-DD format. Tenable.io returns only the plugins that have been updated after the specified date. | |
size | number | The number of records to include in the result set. Default is 1,000. The maximum size is 10,000. | |
page | number | The index of the page to return relative to the specified page size. For example, to return records 10-19 with page size 10, you must specify page 2. If you omit this parameter, Tenable.io applies the default value of 1. |
RESPONSES
status: OK
{"data":{"plugin_details":[{"id":13670,"name":"Fedora Core 1 : kernel-2.4.22-1.2140.nptl (2003-047)","attributes":{"plugin_modification_date":"2018-07-19T00:00:00Z","plugin_version":"1.17","exploited_by_malware":false,"description":"Various RTC drivers had the potential to leak small amounts of kernel memory to userspace through IOCTL's. \n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0984 to this issue.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.","unsupported_by_vendor":false,"cvss_temporal_score":0,"patch_publication_date":"2004-01-07T00:00:00Z","see_also":["http://www.nessus.org/u?07bc9e7f"],"default_account":false,"exploit_available":false,"cve":["CVE-2003-0984"],"exploit_framework_canvas":false,"cvss_base_score":4.6,"solution":"Update the affected packages.","cvss_vector":{"raw":"AV:L/AC:L/Au:N/C:P/I:P/A:P","AccessVector":"Local-access","Availability-Impact":"Partial","Authentication":"None required","Integrity-Impact":"Partial","AccessComplexity":"Low","Confidentiality-Impact":"Partial"},"exploit_framework_exploithub":false,"cpe":["p-cpe:/a:fedoraproject:fedora:kernel-source","cpe:/o:fedoraproject:fedora_core:1","p-cpe:/a:fedoraproject:fedora:kernel-BOOT","p-cpe:/a:fedoraproject:fedora:kernel-debuginfo","p-cpe:/a:fedoraproject:fedora:kernel","p-cpe:/a:fedoraproject:fedora:kernel-doc","p-cpe:/a:fedoraproject:fedora:kernel-smp"],"plugin_publication_date":"2004-07-23T00:00:00Z","exploit_framework_core":false,"in_the_news":false,"has_patch":true,"xref":["FEDORA:2003-047"],"malware":false,"exploit_framework_d2_elliot":false,"xrefs":[{"type":"FEDORA","id":"2003-047"}],"risk_factor":"Medium","synopsis":"The remote Fedora Core host is missing a security update.","cvss3_temporal_score":0,"exploited_by_nessus":false,"cvss3_base_score":0,"exploit_framework_metasploit":false,"plugin_type":"local"}},{"id":13671,"name":"Fedora Core 1 : mc-4.6.0-8.4 (2004-058)","attributes":{"plugin_modification_date":"2018-07-19T00:00:00Z","plugin_version":"1.14","exploited_by_malware":false,"description":"- Sat Jan 31 2004 Jakub Jelinek \u003cjakub at redhat.com\u003e 4.6.0-8.4\n\n - fix previous patch\n\n - Fri Jan 30 2004 Jakub Jelinek \u003cjakub at redhat.com\u003e 4.6.0-8.3\n\n - update php.syntax file (#112645)\n\n - fix crash with large syntax file (#112644)\n\n - Fri Jan 23 2004 Jakub Jelinek \u003cjakub at redhat.com\u003e 4.6.0-8.2\n\n - update CVE-2003-1023 fix to still make vfs symlinks relative, but with bounds checking\n\n - Sat Jan 17 2004 Warren Togami \u003cwtogami at redhat.com\u003e 4.6.0-8.1\n\n - rebuild for FC1\n\n - Sat Jan 17 2004 Warren Togami \u003cwtogami at redhat.com\u003e 4.6.0-7\n\n - BuildRequires glib2-devel, slang-devel, XFree86-devel, e2fsprogs-devel, gettext\n\n - Copyright -\u003e License\n\n - PreReq -\u003e Requires\n\n - Explicit zero epoch in versioned dev dep\n\n - /usr/share/mc directory ownership\n\n - Improve summary\n\n - (Seth Vidal QA) fix for CVE-2003-1023 (Security)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.","unsupported_by_vendor":false,"cvss_temporal_score":0,"patch_publication_date":"2004-02-09T00:00:00Z","see_also":["http://www.nessus.org/u?ea1a95cb"],"default_account":false,"exploit_available":false,"cve":["CVE-2003-1023"],"exploit_framework_canvas":false,"cvss_base_score":7.5,"solution":"Update the affected mc and / or mc-debuginfo packages.","cvss_vector":{"raw":"AV:N/AC:L/Au:N/C:P/I:P/A:P","AccessVector":"Network","Availability-Impact":"Partial","Authentication":"None required","Integrity-Impact":"Partial","AccessComplexity":"Low","Confidentiality-Impact":"Partial"},"exploit_framework_exploithub":false,"cpe":["cpe:/o:fedoraproject:fedora_core:1","p-cpe:/a:fedoraproject:fedora:mc-debuginfo","p-cpe:/a:fedoraproject:fedora:mc"],"plugin_publication_date":"2004-07-23T00:00:00Z","exploit_framework_core":false,"in_the_news":false,"has_patch":true,"xref":["FEDORA:2004-058"],"malware":false,"exploit_framework_d2_elliot":false,"xrefs":[{"type":"FEDORA","id":"2004-058"}],"risk_factor":"High","synopsis":"The remote Fedora Core host is missing a security update.","cvss3_temporal_score":0,"exploited_by_nessus":false,"cvss3_base_score":0,"exploit_framework_metasploit":false,"plugin_type":"local"}},{"id":13672,"name":"Fedora Core 1 : mailman-2.1.4-1 (2004-060)","attributes":{"plugin_modification_date":"2018-07-19T00:00:00Z","plugin_version":"1.12","exploited_by_malware":false,"description":"A cross-site scripting (XSS) vulnerability exists in the admin CGI script for Mailman before 2.1.4. This update moves Mailman to version 2.1.4 which is not vulnerable to this issue.\n\nUpdated packages were made available in February 2004 however the original update notification email did not make it to fedora-announce-list at that time.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.","unsupported_by_vendor":false,"cvss_temporal_score":0,"patch_publication_date":"2004-02-26T00:00:00Z","see_also":["http://www.nessus.org/u?564bb3fe"],"default_account":false,"exploit_available":false,"exploit_framework_canvas":false,"cvss_base_score":0,"solution":"Update the affected mailman and / or mailman-debuginfo packages.","exploit_framework_exploithub":false,"cpe":["cpe:/o:fedoraproject:fedora_core:1","p-cpe:/a:fedoraproject:fedora:mailman-debuginfo","p-cpe:/a:fedoraproject:fedora:mailman"],"plugin_publication_date":"2004-07-23T00:00:00Z","exploit_framework_core":false,"in_the_news":false,"has_patch":true,"xref":["FEDORA:2004-060"],"malware":false,"exploit_framework_d2_elliot":false,"xrefs":[{"type":"FEDORA","id":"2004-060"}],"risk_factor":"High","synopsis":"The remote Fedora Core host is missing a security update.","cvss3_temporal_score":0,"exploited_by_nessus":false,"cvss3_base_score":0,"exploit_framework_metasploit":false,"plugin_type":"local"}}]},"size":1000,"params":{"page":3,"size":1000,"last_updated":"2018-01-01"},"total_count":75621}